Emory<p><a href="https://soc.kvet.ch/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://soc.kvet.ch/tags/Entra" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Entra</span></a> getting more unwanted attention. Didn't we hear about this a couple of months ago?</p><p>> Researchers at <a href="https://soc.kvet.ch/tags/Proofpoint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Proofpoint</span></a> are describing a hacking campaign that is using the team filtration pen testing framework to target more than 80,000 Microsoft Entra ID accounts at hundreds of organizations worldwide. Blame is being placed on a threat actor called <a href="https://soc.kvet.ch/tags/UNK_sneakystrike" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UNK_sneakystrike</span></a>. The attacks occurred from December of last year through to March.</p><p><a href="https://soc.kvet.ch/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://podcasts.apple.com/us/podcast/cyber-security-headlines/id1527478719?i=1000712717747" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">podcasts.apple.com/us/podcast/</span><span class="invisible">cyber-security-headlines/id1527478719?i=1000712717747</span></a></p>